Lockdown 2010 The conference will be begin at 7:45am Please check-in at the registration table in the atrium and pick up a conference hat, name tag and.

Slides:



Advertisements
Similar presentations
To ensure quality instruction and educational success, NVC Information Technology is committed to delivering high quality technical leadership, resources,
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
BYOD Guidelines Crosswell Elementary. Definition of Device For purposes of BYOD, “Device” means a privately owned portable electronic device. That includes,
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Safe Computing Dave Carter, CISSP Michigan State University College of Agriculture and Natural Resources.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Discovering Computers: Chapter 1
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Penn State University College Of Education Understanding College of Education Resources.
New Data Regulation Law 201 CMR TJX Video.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
Welcome to University Library Services The Murray Library.
Welcome to University Library Services St Peter’s Library.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Data Stewardship May 13, 2010 Tom Barton R.L. Morgan Ron Kraemer.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
An Evaluation done by: Lisa R. Hansen Needs Assessment Analysis Star Chart Analysis Results Campuses are at a Developing Technology Level In the areas.
Using SWHS: The AUP [Acceptable Use Policy]
ESCCO Data Security Training David Dixon September 2014.
Sweet and Greet Welcome to University Library Services At Murray.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Welcome to University Library Services Ashburne Library.
Project Tomorrow: Speak Up! Data to Move Your School Forward Robert Hindman, Principal Taylor Elementary School Arlington Public Schools July 2012.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Welcome to another outstanding year at DCE! This is the first year Denton Creek will be a Title 1 school. You should have received your Title 1 Compact.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Sweet and Greet At Ashburne Welcome to University Library Services.
An innovative, electronic personal health record Overview.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Systems that support electronically executed business transactions.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Information Technology Services Monday August 27, 2012 Samuel Merritt University 2012 Faculty Orientation Blair Simmons Director, Information Technology.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
QIP Education Session INFORMATION SECURITY Joseph Zurba Information Security & IT Compliance Officer Harvard Medical School February 16, 2015.
Computing Strategies. A computing strategy should identify – the hardware, – the software, – Internet services, and – the network connectivity needed.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Systems that support electronically executed business transactions.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Orientation programme for degree students Practical information 2 September 2015.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Welcome!. The State of St. Cloud University.
DATA SECURITY FOR MEDICAL RESEARCH
Student IT induction.
Student Monmouth College
UNIT 19 Data Security 2.
Welcome to our parent information session!
Student IT induction.
[Conference Title] [Date]
East Cobb Middle School
Part 3.
Unit# 5: Internet and Worldwide Web
HIPAA & PHI TRAINING & AWARENESS
Uppingham Community College
Division of Engineering Computing Services
Presentation transcript:

Lockdown 2010 The conference will be begin at 7:45am Please check-in at the registration table in the atrium and pick up a conference hat, name tag and schedule/feedback form Breakfast items located in the atrium Please silence cell phones, etc

Lockdown 2010 Presentations will be posted on the Lockdown site Bathroom locations Lunch in the lobby Pick up certification of completion later in the afternoon Return feedback form at the registration table after your last session

Ron Kraemer CIO/Vice Provost for Information Technology University of Wisconsin-Madison Welcome to Lockdown 2010 July 15, 2010

Bruce Orchard UW-Madison graduate Waisman and College of Engineering (CAE) staff member Original BadgIRT Volunteer

Think Differently Show Courage Be Innovative

The Top 10 tactical things we can do to help safeguard the information entrusted to us: 1.Know who is responsible for cybersecurity in your organization and engage them. 2.Use strong passwords. 3.Have up-to-date anti-virus/anti-spyware running on all devices (at home and at work). 4.Use "Identity Finder" to find restricted data on your devices. 5.Encourage everyone to delete data that they do not need. 6.Use encryption software if you must keep restricted data. 7.Ensure your units have firewalls in place. 8.Make sure that your cybersecurity staff members review security-related logs and messages. 9.Keep devices physically safe (laptops, flash drives, etc.). 10.Listen for remarks that make you nervous. 1.Support the strategy to improve data governance and data management [data stewardship]. 2.Support the strategy to fortify the audit and assessment process. The top two strategic things we can do to help safeguard the information entrusted to us: For more information: Invite us to visit with you! [Jim Lowe (Office of Campus Information Security)

Student/Faculty/Staff Data 1.Social Security Numbers 2.Driver’s License Number 3.Financial Account Info (credit/debit card numbers, back account information) 4.Academic Records 5.Health Records 6.Employment Records/Guest Records 7. /Voice Mail Records 8.Location/access data from key cards, wireless Internet connections 9.Surveillance video records 10.Security scan information 11.Library and electronic reserve records 12.Purchase history information 13.Vehicle Data 1.DNA profile information 2.Biometric Data (fingerprints, voiceprints, retina/iris image) 3.Parent Financial Account Info (credit/debit card numbers, back account information) 4.Financial and other data on alumni and donor prospects 5.Behavioral data on the patients treated at college/university hospitals, research subjects, and children cared for in campus day-care centers 6.Data from background checks, references, debt collection, litigation 7.Intellectual Property related to teaching and research Other Data Where is this data? 1.Servers, desktop systems, fixed storage devices (disk and tape), etc. 2.Mobile devices (e.g., laptops, smartphones, removable hard drives, iPods, iPads, flash drives, etc.) 3.Other media (CDs, DVDs, microfiche, digital tape, paper, etc.) 4.Devices outside the university (e.g., Facebook, Google, our personal devices, on associate’s devices, etc.) 5.Other devices connected to the network (e.g., microscopes, lab equipment, video conferencing systems, smartboards, etc.) Safeguarding the Information Entrusted to the University Individual personal data that should not reside on university devices (tax forms, personal account information [iTunes, eTrade, Target.com, etc.], passwords, etc.)